pulumi-gcp 8.8.2a1731515595__py3-none-any.whl → 8.9.0a1731021465__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +0 -64
- pulumi_gcp/activedirectory/domain.py +0 -24
- pulumi_gcp/apigee/__init__.py +0 -1
- pulumi_gcp/apigee/_inputs.py +0 -74
- pulumi_gcp/apigee/outputs.py +0 -65
- pulumi_gcp/applicationintegration/auth_config.py +0 -24
- pulumi_gcp/backupdisasterrecovery/__init__.py +0 -4
- pulumi_gcp/backupdisasterrecovery/_inputs.py +0 -533
- pulumi_gcp/backupdisasterrecovery/backup_vault.py +6 -146
- pulumi_gcp/backupdisasterrecovery/outputs.py +0 -702
- pulumi_gcp/bigquery/data_transfer_config.py +0 -24
- pulumi_gcp/cloudrunv2/_inputs.py +0 -46
- pulumi_gcp/cloudrunv2/job.py +2 -0
- pulumi_gcp/cloudrunv2/outputs.py +2 -60
- pulumi_gcp/cloudrunv2/service.py +2 -0
- pulumi_gcp/compute/__init__.py +0 -1
- pulumi_gcp/compute/_inputs.py +255 -2162
- pulumi_gcp/compute/disk.py +7 -7
- pulumi_gcp/compute/firewall_policy_rule.py +54 -108
- pulumi_gcp/compute/get_region_instance_group_manager.py +1 -12
- pulumi_gcp/compute/health_check.py +42 -42
- pulumi_gcp/compute/network_firewall_policy_rule.py +4 -4
- pulumi_gcp/compute/network_firewall_policy_with_rules.py +10 -10
- pulumi_gcp/compute/node_template.py +0 -95
- pulumi_gcp/compute/outputs.py +213 -1639
- pulumi_gcp/compute/region_disk.py +7 -7
- pulumi_gcp/compute/region_health_check.py +42 -42
- pulumi_gcp/compute/region_instance_group_manager.py +14 -54
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +4 -4
- pulumi_gcp/compute/region_network_firewall_policy_with_rules.py +10 -10
- pulumi_gcp/compute/region_security_policy.py +0 -120
- pulumi_gcp/compute/region_security_policy_rule.py +6 -6
- pulumi_gcp/compute/router_peer.py +35 -56
- pulumi_gcp/compute/security_scan_config.py +8 -8
- pulumi_gcp/config/__init__.pyi +0 -4
- pulumi_gcp/config/vars.py +0 -8
- pulumi_gcp/container/_inputs.py +10 -345
- pulumi_gcp/container/cluster.py +0 -101
- pulumi_gcp/container/get_cluster.py +1 -23
- pulumi_gcp/container/outputs.py +8 -456
- pulumi_gcp/dataloss/prevention_discovery_config.py +7 -7
- pulumi_gcp/dataproc/__init__.py +0 -2
- pulumi_gcp/dataproc/_inputs.py +0 -101
- pulumi_gcp/dataproc/outputs.py +0 -94
- pulumi_gcp/edgecontainer/vpn_connection.py +4 -4
- pulumi_gcp/firebase/android_app.py +2 -2
- pulumi_gcp/firebase/apple_app.py +2 -2
- pulumi_gcp/firebase/web_app.py +2 -2
- pulumi_gcp/firestore/index.py +0 -44
- pulumi_gcp/gkeonprem/_inputs.py +15 -15
- pulumi_gcp/gkeonprem/outputs.py +10 -10
- pulumi_gcp/healthcare/dataset.py +7 -7
- pulumi_gcp/healthcare/dicom_store.py +7 -7
- pulumi_gcp/healthcare/fhir_store.py +7 -7
- pulumi_gcp/healthcare/hl7_store.py +14 -14
- pulumi_gcp/iam/__init__.py +0 -1
- pulumi_gcp/iam/_inputs.py +0 -161
- pulumi_gcp/iam/outputs.py +0 -114
- pulumi_gcp/logging/metric.py +2 -2
- pulumi_gcp/looker/_inputs.py +0 -6
- pulumi_gcp/looker/instance.py +321 -169
- pulumi_gcp/looker/outputs.py +0 -4
- pulumi_gcp/memorystore/instance.py +0 -4
- pulumi_gcp/monitoring/alert_policy.py +0 -24
- pulumi_gcp/monitoring/custom_service.py +0 -24
- pulumi_gcp/monitoring/group.py +0 -24
- pulumi_gcp/monitoring/metric_descriptor.py +0 -24
- pulumi_gcp/monitoring/slo.py +0 -24
- pulumi_gcp/monitoring/uptime_check_config.py +0 -24
- pulumi_gcp/networkmanagement/__init__.py +0 -1
- pulumi_gcp/osconfig/patch_deployment.py +8 -8
- pulumi_gcp/provider.py +0 -40
- pulumi_gcp/pulumi-plugin.json +1 -1
- pulumi_gcp/redis/_inputs.py +3 -3
- pulumi_gcp/redis/outputs.py +2 -2
- pulumi_gcp/securitycenter/notification_config.py +16 -4
- pulumi_gcp/securitycenter/project_notification_config.py +24 -0
- pulumi_gcp/securitycenter/v2_organization_notification_config.py +16 -4
- pulumi_gcp/spanner/__init__.py +0 -1
- pulumi_gcp/spanner/_inputs.py +9 -9
- pulumi_gcp/spanner/get_instance.py +1 -12
- pulumi_gcp/spanner/instance.py +0 -70
- pulumi_gcp/spanner/outputs.py +12 -46
- pulumi_gcp/sql/_inputs.py +0 -26
- pulumi_gcp/sql/database_instance.py +11 -124
- pulumi_gcp/sql/get_database_instance.py +1 -12
- pulumi_gcp/sql/outputs.py +0 -51
- pulumi_gcp/storage/_inputs.py +3 -3
- pulumi_gcp/storage/outputs.py +2 -2
- pulumi_gcp/tags/tag_binding.py +4 -4
- pulumi_gcp/tags/tag_value.py +2 -2
- pulumi_gcp/transcoder/job.py +0 -24
- pulumi_gcp/vertex/_inputs.py +0 -184
- pulumi_gcp/vertex/ai_endpoint.py +8 -394
- pulumi_gcp/vertex/ai_feature_online_store_featureview.py +4 -4
- pulumi_gcp/vertex/outputs.py +0 -166
- pulumi_gcp/workbench/instance.py +7 -21
- pulumi_gcp/workflows/workflow.py +0 -36
- pulumi_gcp/workstations/workstation_config.py +8 -8
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731021465.dist-info}/METADATA +1 -1
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731021465.dist-info}/RECORD +103 -114
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731021465.dist-info}/WHEEL +1 -1
- pulumi_gcp/apigee/api.py +0 -456
- pulumi_gcp/backupdisasterrecovery/backup_plan.py +0 -653
- pulumi_gcp/backupdisasterrecovery/backup_plan_association.py +0 -766
- pulumi_gcp/backupdisasterrecovery/get_backup_plan.py +0 -204
- pulumi_gcp/backupdisasterrecovery/get_backup_plan_association.py +0 -243
- pulumi_gcp/compute/region_resize_request.py +0 -772
- pulumi_gcp/dataproc/gdc_application_environment.py +0 -931
- pulumi_gcp/dataproc/gdc_service_instance.py +0 -1022
- pulumi_gcp/iam/principal_access_boundary_policy.py +0 -679
- pulumi_gcp/networkmanagement/vpc_flow_logs_config.py +0 -1358
- pulumi_gcp/spanner/get_database.py +0 -229
- {pulumi_gcp-8.8.2a1731515595.dist-info → pulumi_gcp-8.9.0a1731021465.dist-info}/top_level.txt +0 -0
pulumi_gcp/container/outputs.py
CHANGED
@@ -98,7 +98,6 @@ __all__ = [
|
|
98
98
|
'ClusterAddonsConfigIstioConfig',
|
99
99
|
'ClusterAddonsConfigKalmConfig',
|
100
100
|
'ClusterAddonsConfigNetworkPolicyConfig',
|
101
|
-
'ClusterAddonsConfigParallelstoreCsiDriverConfig',
|
102
101
|
'ClusterAddonsConfigRayOperatorConfig',
|
103
102
|
'ClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfig',
|
104
103
|
'ClusterAddonsConfigRayOperatorConfigRayClusterMonitoringConfig',
|
@@ -116,8 +115,6 @@ __all__ = [
|
|
116
115
|
'ClusterClusterAutoscalingResourceLimit',
|
117
116
|
'ClusterClusterTelemetry',
|
118
117
|
'ClusterConfidentialNodes',
|
119
|
-
'ClusterControlPlaneEndpointsConfig',
|
120
|
-
'ClusterControlPlaneEndpointsConfigDnsEndpointConfig',
|
121
118
|
'ClusterCostManagementConfig',
|
122
119
|
'ClusterDatabaseEncryption',
|
123
120
|
'ClusterDefaultSnatStatus',
|
@@ -240,7 +237,6 @@ __all__ = [
|
|
240
237
|
'ClusterSecurityPostureConfig',
|
241
238
|
'ClusterServiceExternalIpsConfig',
|
242
239
|
'ClusterTpuConfig',
|
243
|
-
'ClusterUserManagedKeysConfig',
|
244
240
|
'ClusterVerticalPodAutoscaling',
|
245
241
|
'ClusterWorkloadAltsConfig',
|
246
242
|
'ClusterWorkloadIdentityConfig',
|
@@ -298,7 +294,6 @@ __all__ = [
|
|
298
294
|
'GetClusterAddonsConfigIstioConfigResult',
|
299
295
|
'GetClusterAddonsConfigKalmConfigResult',
|
300
296
|
'GetClusterAddonsConfigNetworkPolicyConfigResult',
|
301
|
-
'GetClusterAddonsConfigParallelstoreCsiDriverConfigResult',
|
302
297
|
'GetClusterAddonsConfigRayOperatorConfigResult',
|
303
298
|
'GetClusterAddonsConfigRayOperatorConfigRayClusterLoggingConfigResult',
|
304
299
|
'GetClusterAddonsConfigRayOperatorConfigRayClusterMonitoringConfigResult',
|
@@ -316,8 +311,6 @@ __all__ = [
|
|
316
311
|
'GetClusterClusterAutoscalingResourceLimitResult',
|
317
312
|
'GetClusterClusterTelemetryResult',
|
318
313
|
'GetClusterConfidentialNodeResult',
|
319
|
-
'GetClusterControlPlaneEndpointsConfigResult',
|
320
|
-
'GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult',
|
321
314
|
'GetClusterCostManagementConfigResult',
|
322
315
|
'GetClusterDatabaseEncryptionResult',
|
323
316
|
'GetClusterDefaultSnatStatusResult',
|
@@ -440,7 +433,6 @@ __all__ = [
|
|
440
433
|
'GetClusterSecurityPostureConfigResult',
|
441
434
|
'GetClusterServiceExternalIpsConfigResult',
|
442
435
|
'GetClusterTpuConfigResult',
|
443
|
-
'GetClusterUserManagedKeysConfigResult',
|
444
436
|
'GetClusterVerticalPodAutoscalingResult',
|
445
437
|
'GetClusterWorkloadAltsConfigResult',
|
446
438
|
'GetClusterWorkloadIdentityConfigResult',
|
@@ -3900,8 +3892,6 @@ class ClusterAddonsConfig(dict):
|
|
3900
3892
|
suggest = "kalm_config"
|
3901
3893
|
elif key == "networkPolicyConfig":
|
3902
3894
|
suggest = "network_policy_config"
|
3903
|
-
elif key == "parallelstoreCsiDriverConfig":
|
3904
|
-
suggest = "parallelstore_csi_driver_config"
|
3905
3895
|
elif key == "rayOperatorConfigs":
|
3906
3896
|
suggest = "ray_operator_configs"
|
3907
3897
|
elif key == "statefulHaConfig":
|
@@ -3931,7 +3921,6 @@ class ClusterAddonsConfig(dict):
|
|
3931
3921
|
istio_config: Optional['outputs.ClusterAddonsConfigIstioConfig'] = None,
|
3932
3922
|
kalm_config: Optional['outputs.ClusterAddonsConfigKalmConfig'] = None,
|
3933
3923
|
network_policy_config: Optional['outputs.ClusterAddonsConfigNetworkPolicyConfig'] = None,
|
3934
|
-
parallelstore_csi_driver_config: Optional['outputs.ClusterAddonsConfigParallelstoreCsiDriverConfig'] = None,
|
3935
3924
|
ray_operator_configs: Optional[Sequence['outputs.ClusterAddonsConfigRayOperatorConfig']] = None,
|
3936
3925
|
stateful_ha_config: Optional['outputs.ClusterAddonsConfigStatefulHaConfig'] = None):
|
3937
3926
|
"""
|
@@ -3976,13 +3965,6 @@ class ClusterAddonsConfig(dict):
|
|
3976
3965
|
otherwise nothing will happen.
|
3977
3966
|
It can only be disabled if the nodes already do not have network policies enabled.
|
3978
3967
|
Defaults to disabled; set `disabled = false` to enable.
|
3979
|
-
:param 'ClusterAddonsConfigParallelstoreCsiDriverConfigArgs' parallelstore_csi_driver_config: The status of the Parallelstore CSI driver addon,
|
3980
|
-
which allows the usage of a Parallelstore instances as volumes.
|
3981
|
-
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
3982
|
-
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
3983
|
-
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
3984
|
-
|
3985
|
-
This example `addons_config` disables two addons:
|
3986
3968
|
:param Sequence['ClusterAddonsConfigRayOperatorConfigArgs'] ray_operator_configs: . The status of the [Ray Operator
|
3987
3969
|
addon](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/concepts/overview).
|
3988
3970
|
It is disabled by default. Set `enabled = true` to enable. The minimum
|
@@ -3995,6 +3977,9 @@ class ClusterAddonsConfig(dict):
|
|
3995
3977
|
clusters on
|
3996
3978
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
3997
3979
|
for more information.
|
3980
|
+
|
3981
|
+
|
3982
|
+
This example `addons_config` disables two addons:
|
3998
3983
|
:param 'ClusterAddonsConfigStatefulHaConfigArgs' stateful_ha_config: .
|
3999
3984
|
The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications.
|
4000
3985
|
It is disabled by default for Standard clusters. Set `enabled = true` to enable.
|
@@ -4023,8 +4008,6 @@ class ClusterAddonsConfig(dict):
|
|
4023
4008
|
pulumi.set(__self__, "kalm_config", kalm_config)
|
4024
4009
|
if network_policy_config is not None:
|
4025
4010
|
pulumi.set(__self__, "network_policy_config", network_policy_config)
|
4026
|
-
if parallelstore_csi_driver_config is not None:
|
4027
|
-
pulumi.set(__self__, "parallelstore_csi_driver_config", parallelstore_csi_driver_config)
|
4028
4011
|
if ray_operator_configs is not None:
|
4029
4012
|
pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
|
4030
4013
|
if stateful_ha_config is not None:
|
@@ -4155,20 +4138,6 @@ class ClusterAddonsConfig(dict):
|
|
4155
4138
|
"""
|
4156
4139
|
return pulumi.get(self, "network_policy_config")
|
4157
4140
|
|
4158
|
-
@property
|
4159
|
-
@pulumi.getter(name="parallelstoreCsiDriverConfig")
|
4160
|
-
def parallelstore_csi_driver_config(self) -> Optional['outputs.ClusterAddonsConfigParallelstoreCsiDriverConfig']:
|
4161
|
-
"""
|
4162
|
-
The status of the Parallelstore CSI driver addon,
|
4163
|
-
which allows the usage of a Parallelstore instances as volumes.
|
4164
|
-
It is disabled by default for Standard clusters; set `enabled = true` to enable.
|
4165
|
-
It is enabled by default for Autopilot clusters with version 1.29 or later; set `enabled = true` to enable it explicitly.
|
4166
|
-
See [Enable the Parallelstore CSI driver](https://cloud.google.com/kubernetes-engine/docs/how-to/persistent-volumes/parallelstore-csi-new-volume#enable) for more information.
|
4167
|
-
|
4168
|
-
This example `addons_config` disables two addons:
|
4169
|
-
"""
|
4170
|
-
return pulumi.get(self, "parallelstore_csi_driver_config")
|
4171
|
-
|
4172
4141
|
@property
|
4173
4142
|
@pulumi.getter(name="rayOperatorConfigs")
|
4174
4143
|
def ray_operator_configs(self) -> Optional[Sequence['outputs.ClusterAddonsConfigRayOperatorConfig']]:
|
@@ -4185,6 +4154,9 @@ class ClusterAddonsConfig(dict):
|
|
4185
4154
|
clusters on
|
4186
4155
|
GKE](https://cloud.google.com/kubernetes-engine/docs/add-on/ray-on-gke/how-to/collect-view-logs-metrics)
|
4187
4156
|
for more information.
|
4157
|
+
|
4158
|
+
|
4159
|
+
This example `addons_config` disables two addons:
|
4188
4160
|
"""
|
4189
4161
|
return pulumi.get(self, "ray_operator_configs")
|
4190
4162
|
|
@@ -4430,18 +4402,6 @@ class ClusterAddonsConfigNetworkPolicyConfig(dict):
|
|
4430
4402
|
return pulumi.get(self, "disabled")
|
4431
4403
|
|
4432
4404
|
|
4433
|
-
@pulumi.output_type
|
4434
|
-
class ClusterAddonsConfigParallelstoreCsiDriverConfig(dict):
|
4435
|
-
def __init__(__self__, *,
|
4436
|
-
enabled: bool):
|
4437
|
-
pulumi.set(__self__, "enabled", enabled)
|
4438
|
-
|
4439
|
-
@property
|
4440
|
-
@pulumi.getter
|
4441
|
-
def enabled(self) -> bool:
|
4442
|
-
return pulumi.get(self, "enabled")
|
4443
|
-
|
4444
|
-
|
4445
4405
|
@pulumi.output_type
|
4446
4406
|
class ClusterAddonsConfigRayOperatorConfig(dict):
|
4447
4407
|
@staticmethod
|
@@ -5366,90 +5326,6 @@ class ClusterConfidentialNodes(dict):
|
|
5366
5326
|
return pulumi.get(self, "enabled")
|
5367
5327
|
|
5368
5328
|
|
5369
|
-
@pulumi.output_type
|
5370
|
-
class ClusterControlPlaneEndpointsConfig(dict):
|
5371
|
-
@staticmethod
|
5372
|
-
def __key_warning(key: str):
|
5373
|
-
suggest = None
|
5374
|
-
if key == "dnsEndpointConfig":
|
5375
|
-
suggest = "dns_endpoint_config"
|
5376
|
-
|
5377
|
-
if suggest:
|
5378
|
-
pulumi.log.warn(f"Key '{key}' not found in ClusterControlPlaneEndpointsConfig. Access the value via the '{suggest}' property getter instead.")
|
5379
|
-
|
5380
|
-
def __getitem__(self, key: str) -> Any:
|
5381
|
-
ClusterControlPlaneEndpointsConfig.__key_warning(key)
|
5382
|
-
return super().__getitem__(key)
|
5383
|
-
|
5384
|
-
def get(self, key: str, default = None) -> Any:
|
5385
|
-
ClusterControlPlaneEndpointsConfig.__key_warning(key)
|
5386
|
-
return super().get(key, default)
|
5387
|
-
|
5388
|
-
def __init__(__self__, *,
|
5389
|
-
dns_endpoint_config: Optional['outputs.ClusterControlPlaneEndpointsConfigDnsEndpointConfig'] = None):
|
5390
|
-
"""
|
5391
|
-
:param 'ClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs' dns_endpoint_config: DNS endpoint configuration.
|
5392
|
-
"""
|
5393
|
-
if dns_endpoint_config is not None:
|
5394
|
-
pulumi.set(__self__, "dns_endpoint_config", dns_endpoint_config)
|
5395
|
-
|
5396
|
-
@property
|
5397
|
-
@pulumi.getter(name="dnsEndpointConfig")
|
5398
|
-
def dns_endpoint_config(self) -> Optional['outputs.ClusterControlPlaneEndpointsConfigDnsEndpointConfig']:
|
5399
|
-
"""
|
5400
|
-
DNS endpoint configuration.
|
5401
|
-
"""
|
5402
|
-
return pulumi.get(self, "dns_endpoint_config")
|
5403
|
-
|
5404
|
-
|
5405
|
-
@pulumi.output_type
|
5406
|
-
class ClusterControlPlaneEndpointsConfigDnsEndpointConfig(dict):
|
5407
|
-
@staticmethod
|
5408
|
-
def __key_warning(key: str):
|
5409
|
-
suggest = None
|
5410
|
-
if key == "allowExternalTraffic":
|
5411
|
-
suggest = "allow_external_traffic"
|
5412
|
-
|
5413
|
-
if suggest:
|
5414
|
-
pulumi.log.warn(f"Key '{key}' not found in ClusterControlPlaneEndpointsConfigDnsEndpointConfig. Access the value via the '{suggest}' property getter instead.")
|
5415
|
-
|
5416
|
-
def __getitem__(self, key: str) -> Any:
|
5417
|
-
ClusterControlPlaneEndpointsConfigDnsEndpointConfig.__key_warning(key)
|
5418
|
-
return super().__getitem__(key)
|
5419
|
-
|
5420
|
-
def get(self, key: str, default = None) -> Any:
|
5421
|
-
ClusterControlPlaneEndpointsConfigDnsEndpointConfig.__key_warning(key)
|
5422
|
-
return super().get(key, default)
|
5423
|
-
|
5424
|
-
def __init__(__self__, *,
|
5425
|
-
allow_external_traffic: Optional[bool] = None,
|
5426
|
-
endpoint: Optional[str] = None):
|
5427
|
-
"""
|
5428
|
-
:param bool allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
5429
|
-
:param str endpoint: The cluster's DNS endpoint.
|
5430
|
-
"""
|
5431
|
-
if allow_external_traffic is not None:
|
5432
|
-
pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
|
5433
|
-
if endpoint is not None:
|
5434
|
-
pulumi.set(__self__, "endpoint", endpoint)
|
5435
|
-
|
5436
|
-
@property
|
5437
|
-
@pulumi.getter(name="allowExternalTraffic")
|
5438
|
-
def allow_external_traffic(self) -> Optional[bool]:
|
5439
|
-
"""
|
5440
|
-
Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
5441
|
-
"""
|
5442
|
-
return pulumi.get(self, "allow_external_traffic")
|
5443
|
-
|
5444
|
-
@property
|
5445
|
-
@pulumi.getter
|
5446
|
-
def endpoint(self) -> Optional[str]:
|
5447
|
-
"""
|
5448
|
-
The cluster's DNS endpoint.
|
5449
|
-
"""
|
5450
|
-
return pulumi.get(self, "endpoint")
|
5451
|
-
|
5452
|
-
|
5453
5329
|
@pulumi.output_type
|
5454
5330
|
class ClusterCostManagementConfig(dict):
|
5455
5331
|
def __init__(__self__, *,
|
@@ -6517,8 +6393,6 @@ class ClusterMasterAuthorizedNetworksConfig(dict):
|
|
6517
6393
|
suggest = "cidr_blocks"
|
6518
6394
|
elif key == "gcpPublicCidrsAccessEnabled":
|
6519
6395
|
suggest = "gcp_public_cidrs_access_enabled"
|
6520
|
-
elif key == "privateEndpointEnforcementEnabled":
|
6521
|
-
suggest = "private_endpoint_enforcement_enabled"
|
6522
6396
|
|
6523
6397
|
if suggest:
|
6524
6398
|
pulumi.log.warn(f"Key '{key}' not found in ClusterMasterAuthorizedNetworksConfig. Access the value via the '{suggest}' property getter instead.")
|
@@ -6533,21 +6407,17 @@ class ClusterMasterAuthorizedNetworksConfig(dict):
|
|
6533
6407
|
|
6534
6408
|
def __init__(__self__, *,
|
6535
6409
|
cidr_blocks: Optional[Sequence['outputs.ClusterMasterAuthorizedNetworksConfigCidrBlock']] = None,
|
6536
|
-
gcp_public_cidrs_access_enabled: Optional[bool] = None
|
6537
|
-
private_endpoint_enforcement_enabled: Optional[bool] = None):
|
6410
|
+
gcp_public_cidrs_access_enabled: Optional[bool] = None):
|
6538
6411
|
"""
|
6539
6412
|
:param Sequence['ClusterMasterAuthorizedNetworksConfigCidrBlockArgs'] cidr_blocks: External networks that can access the
|
6540
6413
|
Kubernetes cluster master through HTTPS.
|
6541
6414
|
:param bool gcp_public_cidrs_access_enabled: Whether Kubernetes master is
|
6542
6415
|
accessible via Google Compute Engine Public IPs.
|
6543
|
-
:param bool private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
6544
6416
|
"""
|
6545
6417
|
if cidr_blocks is not None:
|
6546
6418
|
pulumi.set(__self__, "cidr_blocks", cidr_blocks)
|
6547
6419
|
if gcp_public_cidrs_access_enabled is not None:
|
6548
6420
|
pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
|
6549
|
-
if private_endpoint_enforcement_enabled is not None:
|
6550
|
-
pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
|
6551
6421
|
|
6552
6422
|
@property
|
6553
6423
|
@pulumi.getter(name="cidrBlocks")
|
@@ -6567,14 +6437,6 @@ class ClusterMasterAuthorizedNetworksConfig(dict):
|
|
6567
6437
|
"""
|
6568
6438
|
return pulumi.get(self, "gcp_public_cidrs_access_enabled")
|
6569
6439
|
|
6570
|
-
@property
|
6571
|
-
@pulumi.getter(name="privateEndpointEnforcementEnabled")
|
6572
|
-
def private_endpoint_enforcement_enabled(self) -> Optional[bool]:
|
6573
|
-
"""
|
6574
|
-
Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
6575
|
-
"""
|
6576
|
-
return pulumi.get(self, "private_endpoint_enforcement_enabled")
|
6577
|
-
|
6578
6440
|
|
6579
6441
|
@pulumi.output_type
|
6580
6442
|
class ClusterMasterAuthorizedNetworksConfigCidrBlock(dict):
|
@@ -12798,140 +12660,6 @@ class ClusterTpuConfig(dict):
|
|
12798
12660
|
return pulumi.get(self, "use_service_networking")
|
12799
12661
|
|
12800
12662
|
|
12801
|
-
@pulumi.output_type
|
12802
|
-
class ClusterUserManagedKeysConfig(dict):
|
12803
|
-
@staticmethod
|
12804
|
-
def __key_warning(key: str):
|
12805
|
-
suggest = None
|
12806
|
-
if key == "aggregationCa":
|
12807
|
-
suggest = "aggregation_ca"
|
12808
|
-
elif key == "clusterCa":
|
12809
|
-
suggest = "cluster_ca"
|
12810
|
-
elif key == "controlPlaneDiskEncryptionKey":
|
12811
|
-
suggest = "control_plane_disk_encryption_key"
|
12812
|
-
elif key == "etcdApiCa":
|
12813
|
-
suggest = "etcd_api_ca"
|
12814
|
-
elif key == "etcdPeerCa":
|
12815
|
-
suggest = "etcd_peer_ca"
|
12816
|
-
elif key == "gkeopsEtcdBackupEncryptionKey":
|
12817
|
-
suggest = "gkeops_etcd_backup_encryption_key"
|
12818
|
-
elif key == "serviceAccountSigningKeys":
|
12819
|
-
suggest = "service_account_signing_keys"
|
12820
|
-
elif key == "serviceAccountVerificationKeys":
|
12821
|
-
suggest = "service_account_verification_keys"
|
12822
|
-
|
12823
|
-
if suggest:
|
12824
|
-
pulumi.log.warn(f"Key '{key}' not found in ClusterUserManagedKeysConfig. Access the value via the '{suggest}' property getter instead.")
|
12825
|
-
|
12826
|
-
def __getitem__(self, key: str) -> Any:
|
12827
|
-
ClusterUserManagedKeysConfig.__key_warning(key)
|
12828
|
-
return super().__getitem__(key)
|
12829
|
-
|
12830
|
-
def get(self, key: str, default = None) -> Any:
|
12831
|
-
ClusterUserManagedKeysConfig.__key_warning(key)
|
12832
|
-
return super().get(key, default)
|
12833
|
-
|
12834
|
-
def __init__(__self__, *,
|
12835
|
-
aggregation_ca: Optional[str] = None,
|
12836
|
-
cluster_ca: Optional[str] = None,
|
12837
|
-
control_plane_disk_encryption_key: Optional[str] = None,
|
12838
|
-
etcd_api_ca: Optional[str] = None,
|
12839
|
-
etcd_peer_ca: Optional[str] = None,
|
12840
|
-
gkeops_etcd_backup_encryption_key: Optional[str] = None,
|
12841
|
-
service_account_signing_keys: Optional[Sequence[str]] = None,
|
12842
|
-
service_account_verification_keys: Optional[Sequence[str]] = None):
|
12843
|
-
"""
|
12844
|
-
:param str aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
12845
|
-
:param str cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
12846
|
-
:param str control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
12847
|
-
:param str etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
12848
|
-
:param str etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
12849
|
-
:param str gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
12850
|
-
:param Sequence[str] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
12851
|
-
:param Sequence[str] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
12852
|
-
"""
|
12853
|
-
if aggregation_ca is not None:
|
12854
|
-
pulumi.set(__self__, "aggregation_ca", aggregation_ca)
|
12855
|
-
if cluster_ca is not None:
|
12856
|
-
pulumi.set(__self__, "cluster_ca", cluster_ca)
|
12857
|
-
if control_plane_disk_encryption_key is not None:
|
12858
|
-
pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
|
12859
|
-
if etcd_api_ca is not None:
|
12860
|
-
pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
|
12861
|
-
if etcd_peer_ca is not None:
|
12862
|
-
pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
|
12863
|
-
if gkeops_etcd_backup_encryption_key is not None:
|
12864
|
-
pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
|
12865
|
-
if service_account_signing_keys is not None:
|
12866
|
-
pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
|
12867
|
-
if service_account_verification_keys is not None:
|
12868
|
-
pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
|
12869
|
-
|
12870
|
-
@property
|
12871
|
-
@pulumi.getter(name="aggregationCa")
|
12872
|
-
def aggregation_ca(self) -> Optional[str]:
|
12873
|
-
"""
|
12874
|
-
The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
12875
|
-
"""
|
12876
|
-
return pulumi.get(self, "aggregation_ca")
|
12877
|
-
|
12878
|
-
@property
|
12879
|
-
@pulumi.getter(name="clusterCa")
|
12880
|
-
def cluster_ca(self) -> Optional[str]:
|
12881
|
-
"""
|
12882
|
-
The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
12883
|
-
"""
|
12884
|
-
return pulumi.get(self, "cluster_ca")
|
12885
|
-
|
12886
|
-
@property
|
12887
|
-
@pulumi.getter(name="controlPlaneDiskEncryptionKey")
|
12888
|
-
def control_plane_disk_encryption_key(self) -> Optional[str]:
|
12889
|
-
"""
|
12890
|
-
The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
12891
|
-
"""
|
12892
|
-
return pulumi.get(self, "control_plane_disk_encryption_key")
|
12893
|
-
|
12894
|
-
@property
|
12895
|
-
@pulumi.getter(name="etcdApiCa")
|
12896
|
-
def etcd_api_ca(self) -> Optional[str]:
|
12897
|
-
"""
|
12898
|
-
The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
12899
|
-
"""
|
12900
|
-
return pulumi.get(self, "etcd_api_ca")
|
12901
|
-
|
12902
|
-
@property
|
12903
|
-
@pulumi.getter(name="etcdPeerCa")
|
12904
|
-
def etcd_peer_ca(self) -> Optional[str]:
|
12905
|
-
"""
|
12906
|
-
The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
12907
|
-
"""
|
12908
|
-
return pulumi.get(self, "etcd_peer_ca")
|
12909
|
-
|
12910
|
-
@property
|
12911
|
-
@pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
|
12912
|
-
def gkeops_etcd_backup_encryption_key(self) -> Optional[str]:
|
12913
|
-
"""
|
12914
|
-
Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
12915
|
-
"""
|
12916
|
-
return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
|
12917
|
-
|
12918
|
-
@property
|
12919
|
-
@pulumi.getter(name="serviceAccountSigningKeys")
|
12920
|
-
def service_account_signing_keys(self) -> Optional[Sequence[str]]:
|
12921
|
-
"""
|
12922
|
-
The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
12923
|
-
"""
|
12924
|
-
return pulumi.get(self, "service_account_signing_keys")
|
12925
|
-
|
12926
|
-
@property
|
12927
|
-
@pulumi.getter(name="serviceAccountVerificationKeys")
|
12928
|
-
def service_account_verification_keys(self) -> Optional[Sequence[str]]:
|
12929
|
-
"""
|
12930
|
-
The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
12931
|
-
"""
|
12932
|
-
return pulumi.get(self, "service_account_verification_keys")
|
12933
|
-
|
12934
|
-
|
12935
12663
|
@pulumi.output_type
|
12936
12664
|
class ClusterVerticalPodAutoscaling(dict):
|
12937
12665
|
def __init__(__self__, *,
|
@@ -15539,7 +15267,6 @@ class GetClusterAddonsConfigResult(dict):
|
|
15539
15267
|
istio_configs: Sequence['outputs.GetClusterAddonsConfigIstioConfigResult'],
|
15540
15268
|
kalm_configs: Sequence['outputs.GetClusterAddonsConfigKalmConfigResult'],
|
15541
15269
|
network_policy_configs: Sequence['outputs.GetClusterAddonsConfigNetworkPolicyConfigResult'],
|
15542
|
-
parallelstore_csi_driver_configs: Sequence['outputs.GetClusterAddonsConfigParallelstoreCsiDriverConfigResult'],
|
15543
15270
|
ray_operator_configs: Sequence['outputs.GetClusterAddonsConfigRayOperatorConfigResult'],
|
15544
15271
|
stateful_ha_configs: Sequence['outputs.GetClusterAddonsConfigStatefulHaConfigResult']):
|
15545
15272
|
"""
|
@@ -15555,7 +15282,6 @@ class GetClusterAddonsConfigResult(dict):
|
|
15555
15282
|
:param Sequence['GetClusterAddonsConfigIstioConfigArgs'] istio_configs: The status of the Istio addon.
|
15556
15283
|
:param Sequence['GetClusterAddonsConfigKalmConfigArgs'] kalm_configs: Configuration for the KALM addon, which manages the lifecycle of k8s. It is disabled by default; Set enabled = true to enable.
|
15557
15284
|
:param Sequence['GetClusterAddonsConfigNetworkPolicyConfigArgs'] network_policy_configs: Whether we should enable the network policy addon for the master. This must be enabled in order to enable network policy for the nodes. To enable this, you must also define a network_policy block, otherwise nothing will happen. It can only be disabled if the nodes already do not have network policies enabled. Defaults to disabled; set disabled = false to enable.
|
15558
|
-
:param Sequence['GetClusterAddonsConfigParallelstoreCsiDriverConfigArgs'] parallelstore_csi_driver_configs: The status of the Parallelstore CSI driver addon, which allows the usage of Parallelstore instances as volumes. Defaults to disabled; set enabled = true to enable.
|
15559
15285
|
:param Sequence['GetClusterAddonsConfigRayOperatorConfigArgs'] ray_operator_configs: The status of the Ray Operator addon, which enabled management of Ray AI/ML jobs on GKE. Defaults to disabled; set enabled = true to enable.
|
15560
15286
|
:param Sequence['GetClusterAddonsConfigStatefulHaConfigArgs'] stateful_ha_configs: The status of the Stateful HA addon, which provides automatic configurable failover for stateful applications. Defaults to disabled; set enabled = true to enable.
|
15561
15287
|
"""
|
@@ -15571,7 +15297,6 @@ class GetClusterAddonsConfigResult(dict):
|
|
15571
15297
|
pulumi.set(__self__, "istio_configs", istio_configs)
|
15572
15298
|
pulumi.set(__self__, "kalm_configs", kalm_configs)
|
15573
15299
|
pulumi.set(__self__, "network_policy_configs", network_policy_configs)
|
15574
|
-
pulumi.set(__self__, "parallelstore_csi_driver_configs", parallelstore_csi_driver_configs)
|
15575
15300
|
pulumi.set(__self__, "ray_operator_configs", ray_operator_configs)
|
15576
15301
|
pulumi.set(__self__, "stateful_ha_configs", stateful_ha_configs)
|
15577
15302
|
|
@@ -15671,14 +15396,6 @@ class GetClusterAddonsConfigResult(dict):
|
|
15671
15396
|
"""
|
15672
15397
|
return pulumi.get(self, "network_policy_configs")
|
15673
15398
|
|
15674
|
-
@property
|
15675
|
-
@pulumi.getter(name="parallelstoreCsiDriverConfigs")
|
15676
|
-
def parallelstore_csi_driver_configs(self) -> Sequence['outputs.GetClusterAddonsConfigParallelstoreCsiDriverConfigResult']:
|
15677
|
-
"""
|
15678
|
-
The status of the Parallelstore CSI driver addon, which allows the usage of Parallelstore instances as volumes. Defaults to disabled; set enabled = true to enable.
|
15679
|
-
"""
|
15680
|
-
return pulumi.get(self, "parallelstore_csi_driver_configs")
|
15681
|
-
|
15682
15399
|
@property
|
15683
15400
|
@pulumi.getter(name="rayOperatorConfigs")
|
15684
15401
|
def ray_operator_configs(self) -> Sequence['outputs.GetClusterAddonsConfigRayOperatorConfigResult']:
|
@@ -15864,18 +15581,6 @@ class GetClusterAddonsConfigNetworkPolicyConfigResult(dict):
|
|
15864
15581
|
return pulumi.get(self, "disabled")
|
15865
15582
|
|
15866
15583
|
|
15867
|
-
@pulumi.output_type
|
15868
|
-
class GetClusterAddonsConfigParallelstoreCsiDriverConfigResult(dict):
|
15869
|
-
def __init__(__self__, *,
|
15870
|
-
enabled: bool):
|
15871
|
-
pulumi.set(__self__, "enabled", enabled)
|
15872
|
-
|
15873
|
-
@property
|
15874
|
-
@pulumi.getter
|
15875
|
-
def enabled(self) -> bool:
|
15876
|
-
return pulumi.get(self, "enabled")
|
15877
|
-
|
15878
|
-
|
15879
15584
|
@pulumi.output_type
|
15880
15585
|
class GetClusterAddonsConfigRayOperatorConfigResult(dict):
|
15881
15586
|
def __init__(__self__, *,
|
@@ -16476,53 +16181,6 @@ class GetClusterConfidentialNodeResult(dict):
|
|
16476
16181
|
return pulumi.get(self, "enabled")
|
16477
16182
|
|
16478
16183
|
|
16479
|
-
@pulumi.output_type
|
16480
|
-
class GetClusterControlPlaneEndpointsConfigResult(dict):
|
16481
|
-
def __init__(__self__, *,
|
16482
|
-
dns_endpoint_configs: Sequence['outputs.GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult']):
|
16483
|
-
"""
|
16484
|
-
:param Sequence['GetClusterControlPlaneEndpointsConfigDnsEndpointConfigArgs'] dns_endpoint_configs: DNS endpoint configuration.
|
16485
|
-
"""
|
16486
|
-
pulumi.set(__self__, "dns_endpoint_configs", dns_endpoint_configs)
|
16487
|
-
|
16488
|
-
@property
|
16489
|
-
@pulumi.getter(name="dnsEndpointConfigs")
|
16490
|
-
def dns_endpoint_configs(self) -> Sequence['outputs.GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult']:
|
16491
|
-
"""
|
16492
|
-
DNS endpoint configuration.
|
16493
|
-
"""
|
16494
|
-
return pulumi.get(self, "dns_endpoint_configs")
|
16495
|
-
|
16496
|
-
|
16497
|
-
@pulumi.output_type
|
16498
|
-
class GetClusterControlPlaneEndpointsConfigDnsEndpointConfigResult(dict):
|
16499
|
-
def __init__(__self__, *,
|
16500
|
-
allow_external_traffic: bool,
|
16501
|
-
endpoint: str):
|
16502
|
-
"""
|
16503
|
-
:param bool allow_external_traffic: Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
16504
|
-
:param str endpoint: The cluster's DNS endpoint.
|
16505
|
-
"""
|
16506
|
-
pulumi.set(__self__, "allow_external_traffic", allow_external_traffic)
|
16507
|
-
pulumi.set(__self__, "endpoint", endpoint)
|
16508
|
-
|
16509
|
-
@property
|
16510
|
-
@pulumi.getter(name="allowExternalTraffic")
|
16511
|
-
def allow_external_traffic(self) -> bool:
|
16512
|
-
"""
|
16513
|
-
Controls whether user traffic is allowed over this endpoint. Note that GCP-managed services may still use the endpoint even if this is false.
|
16514
|
-
"""
|
16515
|
-
return pulumi.get(self, "allow_external_traffic")
|
16516
|
-
|
16517
|
-
@property
|
16518
|
-
@pulumi.getter
|
16519
|
-
def endpoint(self) -> str:
|
16520
|
-
"""
|
16521
|
-
The cluster's DNS endpoint.
|
16522
|
-
"""
|
16523
|
-
return pulumi.get(self, "endpoint")
|
16524
|
-
|
16525
|
-
|
16526
16184
|
@pulumi.output_type
|
16527
16185
|
class GetClusterCostManagementConfigResult(dict):
|
16528
16186
|
def __init__(__self__, *,
|
@@ -17104,16 +16762,13 @@ class GetClusterMasterAuthClientCertificateConfigResult(dict):
|
|
17104
16762
|
class GetClusterMasterAuthorizedNetworksConfigResult(dict):
|
17105
16763
|
def __init__(__self__, *,
|
17106
16764
|
cidr_blocks: Sequence['outputs.GetClusterMasterAuthorizedNetworksConfigCidrBlockResult'],
|
17107
|
-
gcp_public_cidrs_access_enabled: bool
|
17108
|
-
private_endpoint_enforcement_enabled: bool):
|
16765
|
+
gcp_public_cidrs_access_enabled: bool):
|
17109
16766
|
"""
|
17110
16767
|
:param Sequence['GetClusterMasterAuthorizedNetworksConfigCidrBlockArgs'] cidr_blocks: External networks that can access the Kubernetes cluster master through HTTPS.
|
17111
16768
|
:param bool gcp_public_cidrs_access_enabled: Whether Kubernetes master is accessible via Google Compute Engine Public IPs.
|
17112
|
-
:param bool private_endpoint_enforcement_enabled: Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
17113
16769
|
"""
|
17114
16770
|
pulumi.set(__self__, "cidr_blocks", cidr_blocks)
|
17115
16771
|
pulumi.set(__self__, "gcp_public_cidrs_access_enabled", gcp_public_cidrs_access_enabled)
|
17116
|
-
pulumi.set(__self__, "private_endpoint_enforcement_enabled", private_endpoint_enforcement_enabled)
|
17117
16772
|
|
17118
16773
|
@property
|
17119
16774
|
@pulumi.getter(name="cidrBlocks")
|
@@ -17131,14 +16786,6 @@ class GetClusterMasterAuthorizedNetworksConfigResult(dict):
|
|
17131
16786
|
"""
|
17132
16787
|
return pulumi.get(self, "gcp_public_cidrs_access_enabled")
|
17133
16788
|
|
17134
|
-
@property
|
17135
|
-
@pulumi.getter(name="privateEndpointEnforcementEnabled")
|
17136
|
-
def private_endpoint_enforcement_enabled(self) -> bool:
|
17137
|
-
"""
|
17138
|
-
Whether authorized networks is enforced on the private endpoint or not. Defaults to false.
|
17139
|
-
"""
|
17140
|
-
return pulumi.get(self, "private_endpoint_enforcement_enabled")
|
17141
|
-
|
17142
16789
|
|
17143
16790
|
@pulumi.output_type
|
17144
16791
|
class GetClusterMasterAuthorizedNetworksConfigCidrBlockResult(dict):
|
@@ -21121,101 +20768,6 @@ class GetClusterTpuConfigResult(dict):
|
|
21121
20768
|
return pulumi.get(self, "use_service_networking")
|
21122
20769
|
|
21123
20770
|
|
21124
|
-
@pulumi.output_type
|
21125
|
-
class GetClusterUserManagedKeysConfigResult(dict):
|
21126
|
-
def __init__(__self__, *,
|
21127
|
-
aggregation_ca: str,
|
21128
|
-
cluster_ca: str,
|
21129
|
-
control_plane_disk_encryption_key: str,
|
21130
|
-
etcd_api_ca: str,
|
21131
|
-
etcd_peer_ca: str,
|
21132
|
-
gkeops_etcd_backup_encryption_key: str,
|
21133
|
-
service_account_signing_keys: Sequence[str],
|
21134
|
-
service_account_verification_keys: Sequence[str]):
|
21135
|
-
"""
|
21136
|
-
:param str aggregation_ca: The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
21137
|
-
:param str cluster_ca: The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
21138
|
-
:param str control_plane_disk_encryption_key: The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
21139
|
-
:param str etcd_api_ca: The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
21140
|
-
:param str etcd_peer_ca: The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
21141
|
-
:param str gkeops_etcd_backup_encryption_key: Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
21142
|
-
:param Sequence[str] service_account_signing_keys: The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
21143
|
-
:param Sequence[str] service_account_verification_keys: The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
21144
|
-
"""
|
21145
|
-
pulumi.set(__self__, "aggregation_ca", aggregation_ca)
|
21146
|
-
pulumi.set(__self__, "cluster_ca", cluster_ca)
|
21147
|
-
pulumi.set(__self__, "control_plane_disk_encryption_key", control_plane_disk_encryption_key)
|
21148
|
-
pulumi.set(__self__, "etcd_api_ca", etcd_api_ca)
|
21149
|
-
pulumi.set(__self__, "etcd_peer_ca", etcd_peer_ca)
|
21150
|
-
pulumi.set(__self__, "gkeops_etcd_backup_encryption_key", gkeops_etcd_backup_encryption_key)
|
21151
|
-
pulumi.set(__self__, "service_account_signing_keys", service_account_signing_keys)
|
21152
|
-
pulumi.set(__self__, "service_account_verification_keys", service_account_verification_keys)
|
21153
|
-
|
21154
|
-
@property
|
21155
|
-
@pulumi.getter(name="aggregationCa")
|
21156
|
-
def aggregation_ca(self) -> str:
|
21157
|
-
"""
|
21158
|
-
The Certificate Authority Service caPool to use for the aggreation CA in this cluster.
|
21159
|
-
"""
|
21160
|
-
return pulumi.get(self, "aggregation_ca")
|
21161
|
-
|
21162
|
-
@property
|
21163
|
-
@pulumi.getter(name="clusterCa")
|
21164
|
-
def cluster_ca(self) -> str:
|
21165
|
-
"""
|
21166
|
-
The Certificate Authority Service caPool to use for the cluster CA in this cluster.
|
21167
|
-
"""
|
21168
|
-
return pulumi.get(self, "cluster_ca")
|
21169
|
-
|
21170
|
-
@property
|
21171
|
-
@pulumi.getter(name="controlPlaneDiskEncryptionKey")
|
21172
|
-
def control_plane_disk_encryption_key(self) -> str:
|
21173
|
-
"""
|
21174
|
-
The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control plane nodes.
|
21175
|
-
"""
|
21176
|
-
return pulumi.get(self, "control_plane_disk_encryption_key")
|
21177
|
-
|
21178
|
-
@property
|
21179
|
-
@pulumi.getter(name="etcdApiCa")
|
21180
|
-
def etcd_api_ca(self) -> str:
|
21181
|
-
"""
|
21182
|
-
The Certificate Authority Service caPool to use for the etcd API CA in this cluster.
|
21183
|
-
"""
|
21184
|
-
return pulumi.get(self, "etcd_api_ca")
|
21185
|
-
|
21186
|
-
@property
|
21187
|
-
@pulumi.getter(name="etcdPeerCa")
|
21188
|
-
def etcd_peer_ca(self) -> str:
|
21189
|
-
"""
|
21190
|
-
The Certificate Authority Service caPool to use for the etcd peer CA in this cluster.
|
21191
|
-
"""
|
21192
|
-
return pulumi.get(self, "etcd_peer_ca")
|
21193
|
-
|
21194
|
-
@property
|
21195
|
-
@pulumi.getter(name="gkeopsEtcdBackupEncryptionKey")
|
21196
|
-
def gkeops_etcd_backup_encryption_key(self) -> str:
|
21197
|
-
"""
|
21198
|
-
Resource path of the Cloud KMS cryptoKey to use for encryption of internal etcd backups.
|
21199
|
-
"""
|
21200
|
-
return pulumi.get(self, "gkeops_etcd_backup_encryption_key")
|
21201
|
-
|
21202
|
-
@property
|
21203
|
-
@pulumi.getter(name="serviceAccountSigningKeys")
|
21204
|
-
def service_account_signing_keys(self) -> Sequence[str]:
|
21205
|
-
"""
|
21206
|
-
The Cloud KMS cryptoKeyVersions to use for signing service account JWTs issued by this cluster.
|
21207
|
-
"""
|
21208
|
-
return pulumi.get(self, "service_account_signing_keys")
|
21209
|
-
|
21210
|
-
@property
|
21211
|
-
@pulumi.getter(name="serviceAccountVerificationKeys")
|
21212
|
-
def service_account_verification_keys(self) -> Sequence[str]:
|
21213
|
-
"""
|
21214
|
-
The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs issued by this cluster.
|
21215
|
-
"""
|
21216
|
-
return pulumi.get(self, "service_account_verification_keys")
|
21217
|
-
|
21218
|
-
|
21219
20771
|
@pulumi.output_type
|
21220
20772
|
class GetClusterVerticalPodAutoscalingResult(dict):
|
21221
20773
|
def __init__(__self__, *,
|